CVE-2022-45805 WordPress Paytm Payment Gateway Plugin <= 2.7.3 is vulnerable to SQL Injection
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Paytm Paytm Payment Gateway paytm-payments allows SQL Injection.This issue affects Paytm Payment Gateway: from n/a through...
10AI Score
0.006EPSS
New York Increases Cybersecurity Rules for Financial Companies
Another example of a large and influential state doing things the federal government won't: Boards of directors, or other senior committees, are charged with overseeing cybersecurity risk management, and must retain an appropriate level of expertise to understand cyber issues, the rules say....
7.3AI Score
Exploit for Improper Authentication in Automattic Woocommerce Payments
WP-CVE-2023-28121 WooCommerce Payments < 5.6.2 -...
9.8CVSS
7AI Score
0.924EPSS
WP-CVE-2023-5360 Royal Elementor Addons and Templates <=...
9.8CVSS
9.7AI Score
0.911EPSS
Debian DSA-5546-1 : chromium - security update
The remote Debian 11 / 12 host has packages installed that are affected by multiple vulnerabilities as referenced in the dsa-5546 advisory. Inappropriate implementation in Payments in Google Chrome prior to 119.0.6045.105 allowed a remote attacker to bypass XSS preventions via a malicious...
8.8CVSS
8.2AI Score
0.005EPSS
Microsoft Edge (Chromium) < 118.0.2088.88 / 119.0.2151.44 Multiple Vulnerabilities
The version of Microsoft Edge installed on the remote Windows host is prior to 118.0.2088.88 / 119.0.2151.44. It is, therefore, affected by multiple vulnerabilities as referenced in the November 2, 2023 advisory. Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability...
8.8CVSS
8.7AI Score
0.005EPSS
FreeBSD : chromium -- multiple vulnerabilities (a1e27775-7a61-11ee-8290-a8a1599412c6)
The version of FreeBSD installed on the remote host is prior to tested version. It is, therefore, affected by multiple vulnerabilities as referenced in the a1e27775-7a61-11ee-8290-a8a1599412c6 advisory. Inappropriate implementation in Payments in Google Chrome prior to 119.0.6045.105 allowed a...
8.8CVSS
8.2AI Score
0.005EPSS
Google Chrome Security Update (stable-channel-update-for-desktop_31-2023-10) - Mac OS X
Google Chrome is prone to multiple ...
8.8CVSS
8.7AI Score
0.005EPSS
Google Chrome Security Update (stable-channel-update-for-desktop_31-2023-10) - Windows
Google Chrome is prone to multiple ...
8.8CVSS
8.7AI Score
0.005EPSS
Google Chrome Security Update (stable-channel-update-for-desktop_31-2023-10) - Linux
Google Chrome is prone to multiple ...
8.8CVSS
8.7AI Score
0.005EPSS
chromium is vulnerable to Remote Code Execution (RCE). The vulnerability exists due to the inappropriate implementation in Payments, which allows an attacker to bypass XSS preventions via a malicious...
6.1CVSS
6.7AI Score
0.001EPSS
Russian Reshipping Service ‘SWAT USA Drop’ Exposed
The login page for the criminal reshipping service SWAT USA Drop. One of the largest cybercrime services for laundering stolen merchandise was hacked recently, exposing its internal operations, finances and organizational structure. Here's a closer look at the Russia-based SWAT USA Drop Service,...
6.5AI Score
Chromium: CVE-2023-5480 Inappropriate implementation in Payments
This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more...
6.1CVSS
6.9AI Score
0.001EPSS
KLA61868 Multiple vulnerabilities in Microsoft Browser
Multiple vulnerabilities were found in Microsoft Browser. Malicious users can exploit these vulnerabilities to execute arbitrary code, cause denial of service, spoof user interface. Below is a complete list of vulnerabilities: Use after free vulnerability in Side Panel can be exploited to cause...
8.8CVSS
8.8AI Score
0.005EPSS
Inappropriate implementation in Payments in Google Chrome prior to 119.0.6045.105 allowed a remote attacker to bypass XSS preventions via a malicious file. (Chromium security severity:...
6.1CVSS
5.3AI Score
0.001EPSS
Inappropriate implementation in Payments in Google Chrome prior to 119.0.6045.105 allowed a remote attacker to bypass XSS preventions via a malicious file. (Chromium security severity:...
6.1CVSS
6.3AI Score
0.001EPSS
Inappropriate implementation in Payments in Google Chrome prior to 119.0.6045.105 allowed a remote attacker to bypass XSS preventions via a malicious file. (Chromium security severity:...
6.1CVSS
4.7AI Score
0.001EPSS
Inappropriate implementation in Payments in Google Chrome prior to 119.0.6045.105 allowed a remote attacker to bypass XSS preventions via a malicious file. (Chromium security severity:...
6.1CVSS
6.1AI Score
0.001EPSS
Inappropriate implementation in Payments in Google Chrome prior to 119.0.6045.105 allowed a remote attacker to bypass XSS preventions via a malicious file. (Chromium security severity:...
6.1CVSS
6.2AI Score
0.001EPSS
Inappropriate implementation in Payments in Google Chrome prior to 119.0.6045.105 allowed a remote attacker to bypass XSS preventions via a malicious file. (Chromium security severity:...
6.5AI Score
0.001EPSS
Inappropriate implementation in Payments in Google Chrome prior to 119.0.6045.105 allowed a remote attacker to bypass XSS preventions via a malicious file. (Chromium security severity: High) Notes Author| Note ---|--- alexmurray | The Debian chromium source package is called chromium-browser in...
6.1CVSS
5.6AI Score
0.001EPSS
Summary An XML External Entity Injection (XXE) vulnerability in Java based XML parsers within IBM Financial Transaction Manager was addressed. Vulnerability Details ** CVEID: CVE-2023-35892 DESCRIPTION: **IBM Financial Transaction Manager for SWIFT Services 3.2.4 is vulnerable to an XML External...
9.1CVSS
6.4AI Score
0.001EPSS
Google Chrome < 119.0.6045.105 Multiple Vulnerabilities
The version of Google Chrome installed on the remote Windows host is prior to 119.0.6045.105. It is, therefore, affected by multiple vulnerabilities as referenced in the 2023_10_stable-channel-update-for-desktop_31 advisory. Inappropriate implementation in Payments in Google Chrome prior to...
8.8CVSS
8.6AI Score
0.005EPSS
Stable Channel Update for Desktop
The Chrome team is delighted to announce the promotion of Chrome 119 to the stable channel for Windows, Mac and Linux. This will roll out over the coming days/weeks. Chrome 119.0.6045.105 (Linux and Mac), 119.0.6045.105/.106( Windows) contains a number of fixes and improvements -- a list of...
8.8CVSS
8.3AI Score
EPSS
KLA61760 Multiple vulnerabilities in Google Chrome
Multiple vulnerabilities were found in Google Chrome. Malicious users can exploit these vulnerabilities to cause denial of service, execute arbitrary code, spoof user interface. Below is a complete list of vulnerabilities: Implementation vulnerability in Payments can be exploited to cause denial...
8.8CVSS
9.1AI Score
EPSS
chromium -- multiple vulnerabilities
Chrome Releases reports: This update includes 15 security fixes: [1492698] High CVE-2023-5480: Inappropriate implementation in Payments. Reported by Vsevolod Kokorin (Slonser) of Solidlab on 2023-10-14 [1492381] High CVE-2023-5482: Insufficient data validation in USB. Reported by DarkNavy on...
8.8CVSS
7.7AI Score
0.005EPSS
Trellix 2024 Threat Predictions
Trellix 2024 Threat Predictions By Trellix · October 30, 2023 Introduction This last year we have seen upheaval across the cybersecurity landscape. The need for effective, worldwide threat intelligence continues to grow as geopolitical and economic developments create an increasingly...
7AI Score
Trellix 2024 Threat Predictions
Trellix 2024 Threat Predictions By Trellix · October 30, 2023 Introduction This last year we have seen upheaval across the cybersecurity landscape. The need for effective, worldwide threat intelligence continues to grow as geopolitical and economic developments create an increasingly...
6.9AI Score
Minter can censor GATEKEEPER and mint uncollateralized for a prolonged period of time
Lines of code https://github.com/code-423n4/2023-10-ethena/blob/ee67d9b542642c9757a6b826c82d0cae60256509/contracts/EthenaMinting.sol#L277-L279 https://github.com/code-423n4/2023-10-ethena/blob/ee67d9b542642c9757a6b826c82d0cae60256509/contracts/EthenaMinting.sol#L162-L187 Vulnerability details...
7.2AI Score
How helpful are estimates about how much cyber attacks cost?
Coming from the newspaper and media industry, I'm no stranger to wanting to write catchy headlines. I'm certainly at fault for throwing together a story about so-and-sos house sold for X million dollars. But recently I've been wondering if those "big numbers" for cybersecurity are helpful at all,.....
7.5AI Score
YoroTrooper: Researchers Warn of Kazakhstan's Stealthy Cyber Espionage Group
A relatively new threat actor known as YoroTrooper is likely made up of operators originating from Kazakhstan. The assessment, which comes from Cisco Talos, is based on their fluency in Kazakh and Russian, use of Tenge to pay for operating infrastructure, and very limited targeting of Kazakhstani.....
6.7AI Score
StripedFly: Perennially flying under the radar
Introduction It's just another cryptocurrency miner… Nobody would even suspect the mining malware was merely a mask, masquerading behind an intricate modular framework that supports both Linux and Windows. It comes equipped with a built-in TOR network tunnel for communication with command servers,....
7.5AI Score
Kazakhstan-associated YoroTrooper disguises origin of attacks as Azerbaijan
Cisco Talos assesses with high confidence that YoroTrooper, an espionage-focused threat actor first active in June 2022, likely consists of individuals from Kazakhstan based on their use of Kazakh currency and fluency in Kazakh and Russian. The actor also appears to have a defensive interest in...
7.5AI Score
Malvertising Campaign Targets Brazil's PIX Payment System with GoPIX Malware
The popularity of Brazil's PIX instant payment system has made it a lucrative target for threat actors looking to generate illicit profits using a new malware called GoPIX. Kaspersky, which has been tracking the active campaign since December 2022, said the attacks are pulled off using malicious...
6.8AI Score
Why We Don’t Generate Elliptic Curves Every Day
With all the talk recently of how the NIST curve parameters were selected, a reasonable observer could wonder why we all use the same curves instead of generating them along with keys, like we do for Diffie-Hellman parameters. (You might have memories of waiting around for openssl dhparam to run...
7.1AI Score
Analysis: A Ransomware Attack on a PostgreSQL Database
In 2017, we reported on a database ransomware campaign targeting MySQL and MongoDB. Since then, we’ve observed similar attack tactics on a PostgreSQL database in Imperva Threat Research lab. In general, the attack flow contained: A brute force attack on the database for known users and weak...
6.8AI Score
34 Cybercriminals Arrested in Spain for Multi-Million Dollar Online Scams
Spanish law enforcement officials have announced the arrest of 34 members of a criminal group that carried out various online scams, netting the gang about €3 million ($3.2 million) in illegal profits. Authorities conducted searches across 16 locations Madrid, Malaga, Huelva, Alicante, and Murcia,....
6.4AI Score
Stealer for PIX payment system, new Lumar stealer and Rhysida ransomware
Introduction As a cybersecurity company, Kaspersky is constantly dealing with known and brand-new malware samples. As part of our crimeware reporting service, we provide our customers with technical reports on the evolution of existing crimeware families, as well as newly emerging ones. In this...
7AI Score
They Cracked the Code to a Locked USB Drive Worth $235 Million in Bitcoin. Then It Got Weird
Stefan Thomas lost the password to an encrypted USB drive holding 7,002 bitcoins. One team of hackers believes they can unlock it—if they can get Thomas to let...
7.1AI Score
Europol Dismantles Ragnar Locker Ransomware Infrastructure, Nabs Key Developer
Europol on Friday announced the takedown of the infrastructure associated with Ragnar Locker ransomware, alongside the arrest of a "key target" in France. "In an action carried out between 16 and 20 October, searches were conducted in Czechia, Spain, and Latvia," the agency said. "The main...
6.4AI Score
Threat Roundup for October 13 to October 20
Today, Talos is publishing a glimpse into the most prevalent threats we've observed between Oct. 13 and Oct. 20. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead, this post will summarize the threats we've observed by highlighting key behavioral characteristics,....
6.9AI Score
Unleashing the Power of the Internet of Things and Cyber Security
Due to the rapid evolution of technology, the Internet of Things (IoT) is changing the way business is conducted around the world. This advancement and the power of the IoT have been nothing short of transformational in making data-driven decisions, accelerating efficiencies, and streamlining...
7AI Score
U.S. DoJ Cracks Down on North Korean IT Scammers Defrauding Global Businesses
The U.S. government has announced the seizure of 17 website domains used by North Korean information technology (IT) workers as part of an illicit scheme to defraud businesses across the world, evade sanctions, and fund the country's ballistic missile program. The Department of Justice (DoJ) said.....
6.6AI Score
Database Ransomware: From Attack to Recovery
Introduction In recent years, ransomware attacks have risen sharply, due to their profitability, ease of access with ransomware-as-a-service (RaaS) tools, and an increasing attack surface. Ransomware is a type of attack in which the attacker locks and encrypts a victim’s data and then demands a...
6.8AI Score
Vulnerability Scanning: How Often Should I Scan?
The time between a vulnerability being discovered and hackers exploiting it is narrower than ever – just 12 days. So it makes sense that organizations are starting to recognize the importance of not leaving long gaps between their scans, and the term "continuous vulnerability scanning" is becoming....
6.9AI Score
The Undernet, a term frequently shrouded in enigma and often linked with unlawful activities, is a concealed segment of the digital world that is purposefully veiled and unreachable via regular internet browsers. This chapter aims to unveil the secrets of the Undernet, step by step demythifying...
7AI Score
The US wants governments to commit to not paying ransoms
As the White House prepares to host its annual International Counter Ransomware Initiative (CRI) summit, Bloomberg reports that the US is pushing other countries to stop paying ransoms to cybercriminals. The CRI wants to enhance international cooperation to combat the growth of ransomware, and its....
6.9AI Score
CERT-UA Reports: 11 Ukrainian Telecom Providers Hit by Cyberattacks
The Computer Emergency Response Team of Ukraine (CERT-UA) has revealed that threat actors "interfered" with at least 11 telecommunication service providers in the country between May and September 2023. The agency is tracking the activity under the name UAC-0165, stating the intrusions led to...
7AI Score
Oracle Critical Patch Update Advisory - October 2023
A Critical Patch Update is a collection of patches for multiple security vulnerabilities. These patches address vulnerabilities in Oracle code and in third party components included in Oracle products. These patches are usually cumulative, but each advisory describes only the security patches...
10CVSS
7.1AI Score
EPSS
Ransomware Attacks Double: Are Companies Prepared for 2024's Cyber Threats?
Ransomware attacks have only increased in sophistication and capabilities over the past year. From new evasion and anti-analysis techniques to stealthier variants coded in new languages, ransomware groups have adapted their tactics to effectively bypass common defense strategies. Cyble, a...
7.5AI Score